Please turn on your JavaScript for this page to function normally.
Hacking Team scrambling to limit damage brought on by explosive data leak

Who hacked Hacking Team, the Milan-based company selling intrusion and surveillance software to governments, law enforcement agencies and (as it turns out) companies? A hacker …

Let’s Encrypt CA releases transparency report before its first certificate

The non-profit CA launched by the EFF, Mozilla and several other businesses and organizations is determined to gain and retain users’ trust. After hiring outside experts …

Plex forums hacked: IPs, private messages, encrypted passwords compromised

Users of Plex’s forums are being forced to change their password in wake of a breach that resulted in the compromise of some of their private information, including …

Harvard University suffers IT security breach

Discovered on June 19, the intrusion was first spotted on the Faculty of Arts and Sciences and Central Administration information technology networks, but a subsequent …

Cloned, booby-trapped Dark Web sites steal bitcoins, login credentials

Someone is cloning .onion sites, and using the clones to intercept user traffic and offer modified content.“I noticed a while ago that there is a clone onion site for …

Fake Twitter verification profiles trick victims into sharing personal, payment card info

A little over 18,000 Twitter users looking for a way to get their accounts verified have been duped by a single fake account promising to provide the service into visiting a …

Popular VPNs leak data, don’t offer promised privacy and anonymity

Virtual Private Network (VPN) services can be used for circumventing Internet censorship and accessing blocked content, but researchers warn that you shouldn’t believe …

Hackers are exploiting Magento flaw to steal payment card info

Attackers are exploiting a vulnerability in eBay’s Magento platform to steal users’ billing information (including payment card info), warns Sucuri …

Researcher tests Tor exit nodes, finds not all operators can be trusted

While the Tor anonymity network conceals (relatively successfully) a user’s location and Internet activity from anyone who might want to know about it, users should be …

How to find a free, secure proxy service?

There are several reasons one might want to use web proxy services, and depending on that reason, it might not be a very good idea to choose a free one randomly.Vienna-based …

Many popular Android apps fail to encrypt login credentials

Using encryption to protect mobile traffic and especially the exchange of credentials between the user and company servers should be a must in this day and age. Unfortunately, …

EFF delves into privacy practices of Apple, Google, Twitter, and others

Our digital lives are leaving data trails through social networking sites, email providers, Internet service providers, and mobile apps. But which companies fight the hardest …

Don't miss

Cybersecurity news